176671 policies in database
Link to program      
2018-12-12
2019-10-05
Dailymotion Public Bug Bounty logo
Thank
Gift
HOF
Reward

Reward

50 € 

Dailymotion Public Bug Bounty

Program Purpose

Dailymotion is a French online video platform founded in 2005, offering users and publishers a space to upload, watch, and distribute professional and curated video content across categories such as news, sports, music, and entertainment.

Maintaining top-notch security online is a community effort and a high priority for Dailymotion. We're lucky to have a vibrant group of independent security researchers who volunteer their time to help us spot potential issues. To recognize the efforts of independent security researchers and the important role they play in keeping Dailymotion safe for everyone, we offer a bounty for reporting certain qualifying security vulnerabilities. Please review the following rules before you reporting a vulnerability. By participating in this Program, you agree to be bound by these rules.

Scopes Descriptions

Main Domains & Applications

  • WILDCARDS - PUBLIC DOMAINS:
    These are our main public facing domains, all subdomains & services included in the listed wildcards included in the scopes of this program.

    • *.dailymotion.com: all our main public websites & platforms
    • AS41690: IP range owned by Dailymotion
    • WILDCARDS - TECHNICAL DOMAINS:
      These are domains mostly used for technical purposes, all subdomains & services included in the listed wildcards included in the scopes of this program

    • *.dmcdn.net: dedicated domain to distribute static content, including all our video content, distributed across our platforms & services.

    • .api.dailymotion.com: all APIs related to public websites & services, detailed API documentation available at developer.dailymotion.com*.
    • .dm.gg* | .dmxleo.com | .kube.dm.gg | *.dm-event.net: : technical domains mostly used for internal services & usages.
    • MOBILE APPLICATIONS:
      Our official Dailymotion applications on the Google Play Store, Apple App Store.

Focus on specific Scopes

  • DAILYMOTION PRO - B2B PLATFORMS:
    These are platforms dedicated to our B2B customers, allowing them to manage our video hosting & distribution services, as well as define and coordinate advertising campaigns across our services & platforms.

    • pro.dailymotion.com & business.dailymotion.com: historical B2B platform for video hosting & distribution services.
    • dailymotion.webflow.io: new version of our B2B platform, including IA & Advertising management services.
    • ray.dailymotion.com: ou AI tool/service to transform campaign briefs into actionable audiences, creative strategies, and activation plans.
    • MCP & AUTOMATION SERVERS:
      The objective of these scopes is to test and report vulnerabilities on our MCP Servers, while complying with the rules and limitations defined by our program. These URLs are normally restricted and accessible only via our company's internal VPN and should not be publicly exposed on the internet. Our goal in including them in the program is to identify potential unauthorized access vulnerabilities that could allow an attacker to bypass these restrictions.

    • https://n8n-staging.k8s.dm.gg/*

    • https://n8n.pub.k8s.dm.gg/*
    • https://airflow-mcp.data.dailymotion.com/*
    • https://bigquery-mcp.data.dailymotion.com/*

Specific rules & additional notes

  • Note concerning XSS and CSRF: We will tend to rate user session-related XSS and CSRF vulnerabilities, whether stored or reflected, with a low impact. For a (very) significant majority, users are unauthenticated and the chances of successfully exploiting such vulnerabilities are therefore minimized. Typically, a reflected XSS vulnerability on our main domain and implying the theft of user cookies on www. or *.dailymotion.com will be rated as Low. Please note that, if you are able to demonstrate an ability to exploit these vulnerabilities in creative ways (possibly combined with other vulnerabilities found by yourself) so as to provably increase the business impact, we will consider this final impact to evaluate the severity.

  • Note concerning IDOR: IDOR vulnerabilities on .api.dailymotion.com via /user/[ID] that does not lead to personal/sensitive info disclosing

  • Different User Types: We have several levels of privileges on the product: unauthenticated user, authenticated user, partner, partner with a verification badge. We invite you to go and explore the attack surface that is specific with each of these profiles as they are all in-scope.

    • Partner accounts are only granted to users after they have accepted the terms of our Dailymotion Partner Program Agreement. Security researchers interested in digging is this part of our perimeter can open such an account by signing up on our partner portal.

    • If you want to test the features exposed only to partners with a verification badge, please file a request on security@dailymotion.com so as to be provided with a verification badge (we'll then provide you with a temporary, dedicated partner account). For practical reasons, Dailymotion reserves the right to evaluate and deny such requests on a case by case basis; typically, we will only consider requests from hunters who have previously reported at least one qualifying vulnerability rated as Medium or more.

    • Systemic Issues Rewarding: reports from the 6th systemic issue will be treated with the informative status. Refer to the dedicated section of the program for more details about 'systemic issues' definition

Program General Rules

Testing Policy, Responsible Disclosure

Please adhere to the following rules while performing research on this program:

  • Denial of service (DoS) attacks on Dailymotion applications, servers, networks or infrastructure are strictly forbidden.
  • Avoid tests that could cause degradation or interruption of our services.
  • Do not use automated scanners or tools that generate large amount of network traffic
  • Do not leak, copy, manipulate, or destroy any user data or files in any of our applications/servers.
  • No vulnerability disclosure, full, partial or otherwise, is allowed.
  • Make sure to apply hunting requirements policy (User-Agent, VPN...)

Important precautions and limitations

As a complement to the Program’s rules and testing policy :

  • DO NOT alter compromised accounts by creating, deleting or modifying any data
  • DO NOT use compromised accounts to search for post-auth vulnerabilities (they won’t be eligible anyway)
  • DO NOT include Personally Identifiable Information (PII) in your report and please REDACT/OBFUSCATE the PII that is part of your PoC (screenshot, server response, JSON file, etc.) as much as possible.
  • In case of exposed credentials or secrets, limit yourself to verifying the credentials validity
  • In case of sensitive information leak, DO NOT extract/copy every document or data that is exposed and limit yourself to describe and list what is exposed.

Reward Eligibility

We are happy to thank everyone who submits valid reports which help us improve the security of Dailymotion, however only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability.
  • The vulnerability must be a qualifying vulnerability
  • The report must contain the following elements:
    • Clear textual description of the vulnerability, how it can be exploited, the security impact it has on the application, its users and Dailymotion, and remediation advice on fixing the vulnerability
    • Proof of exploitation: screenshots demonstrating the exploit was performed, and showing the final impact
    • Provide complete steps with the necessary information to reproduce the exploit, including (if necessary) code snippets, payloads, commands etc
  • Reports failing to demonstrate a tangible attack scenario and opportunity are unlikely to be eligible for reward.
  • You must not break any of the testing policy rules listed above
  • You must not be a former or current employee of Dailymotion or one of its contractors.

Reward amounts are based on:

  • Reward grid of the report's scope
  • CVSS scoring and actual business impact of the vulnerability upon performing risk analysis

Insisting on eligibility rules

Reports failing to demonstrate a tangible attack scenario and opportunity are unlikely to be rewarded. Please keep in mind that whatever you discover, you are required to demonstrate what you believe is a vulnerability. Because we evaluate reports based on business risks and tangible impacts, we don't reward theoretical vulnerabilities (the ones which are almost exploitable, but just "not quite there") — although we are always interested in reading about them!

For example, the exposure of our public website's JWT token for our GraphQL API is not a security issue. We know it's there, in your browser, but you can't do anything with it to attack other people's data (or if you can, do demonstrate your findings).

In the event that we choose not to reward a vulnerability with no demonstrable business impact (for example an XSS on a domain that does not have valuable cookies), we reserve the right to fix the issue in order to avoid further equivalent submissions by other researchers.

Legal Matters

When conducting vulnerability research in good faith and in accordance with the terms specified in this Policy, we consider this research to be:

  • Lawful and in accordance with applicable state laws relating to computer fraud.
    We won't bring any claim against you for circumvention of technology controls;
  • Exempt from restrictions in our Terms of Use only to the extent that they would interfere with conducting security research.

We won’t take legal action against, suspend, or terminate access to the Service for those who discover and report security vulnerabilities responsibly.
Dailymotion reserves all of its legal rights in the event of any noncompliance.
Dailymotion reserves the right to modify the terms of this Program or terminate this Program at any time.

Contact

If you have any concerns or are uncertain whether your security research is consistent with this policy please reach out to security@dailymotion.com before going any further.

In Scope

Scope Type Scope Name
android_application

https://play.google.com/store/apps/details?id=com.dailymotion.dailymotion&hl=fr&gl=US

api

*.api.dailymotion.com

api

https://n8n-staging.k8s.dm.gg/

api

https://n8n.pub.k8s.dm.gg/

api

https://airflow-mcp.data.dailymotion.com/

api

https://bigquery-mcp.data.dailymotion.com/

ios_application

https://apps.apple.com/fr/app/dailymotion/id336978041

undefined

AS41690

web_application

*.dailymotion.com

web_application

*.dmcdn.net

web_application

*.dm.gg

web_application

*.kube.dm.gg

web_application

*.dmxleo.com

web_application

*.dm-event.net

web_application

https://dailymotion.webflow.io/

web_application

https://business.dailymotion.com/

web_application

https://pro.dailymotion.com/

web_application

https://ray.dailymotion.com/

Out of Scope

Scope Type Scope Name
undefined

Anything, domains or subdomains, not explicitly listed as in-scope above, is out-of-scope.

web_application

More specifically, *.ondailymotion.com domains are not in the scope of our program.


The progam has been crawled by Firebounty on 2018-12-12 and updated on 2019-10-05, 2019 reports have been received so far.

FireBounty © 2015-2026

Legal notices | Privacy policy